Messaging isnt even pseudoanonymous as long as original received lines containing sender IP are maintained.

So at least old received hearders should be discarded. I mean received headers telling how message ended to trashmail. Naturally that can be "fixed" by using tools like TOR http://tor.eff.org, but for lawful purposes discarding headers should be ok.

Currently headers are telling everything I need to know to track sender if received headers aren't also filtered out.

- Comments?

If received headers are filtered out. It would be better to save header log information for a quite long time (at least an year). So service like trashmail.net doesn't take blame if bomb or what ever threats or reasons arise.

We just handle the traffic. We can tell where it came from, if court orders so. But without court order, we won't tell anything.

It's just like postal service or any other telephone or ISP service. Logs are maintained, but you'll need legal reason to access those logs. And accessing logs without legal reason is also illegal.

Z wrote:Messaging isnt even pseudoanonymous as long as original received lines containing sender IP are maintained.

So at least old received hearders should be discarded. I mean received headers telling how message ended to trashmail. Naturally that can be "fixed" by using tools like TOR http://tor.eff.org, but for lawful purposes discarding headers should be ok.

Currently headers are telling everything I need to know to track sender if received headers aren't also filtered out.

- Comments?

If received headers are filtered out. It would be better to save header log information for a quite long time (at least an year). So service like trashmail.net doesn't take blame if bomb or what ever threats or reasons arise.

We just handle the traffic. We can tell where it came from, if court orders so. But without court order, we won't tell anything.

It's just like postal service or any other telephone or ISP service. Logs are maintained, but you'll need legal reason to access those logs. And accessing logs without legal reason is also illegal.